Ways to automate testing Linux kernel exploits

Over the life of CentOS 7, its repository has collected 58 different versions of the kernel. On the other end of the GNU/Linux spectrum, there is the LTS of the Ubuntu 16.04 version with more than a hundred in it. If focused on kernel exploits, we relieve ourselves of the necessity to worry about the things that have no relevance to the task. But what if a vulnerability affects kernel versions released over several years, and the used one is unknown?

You can always test your luck but it can turn away from you. As a result, your client may accidentally find out profits are missing due to a server that has its unscheduled kernel panic and despair.

In this talk, we will discuss how a pentester can get rid of some LPE development routine and how to check the workability of a random proof-of-concept and kernel coverage without much effort.


dump_stack() Yet another security researcher with a special interest in Linux kernel security and reverse engineering. Knows nothing. Successfully.

Social sharing